Chapter 19 Flashcards
The process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other activities is _______. (19.6.1.)
Operations Security (OPSEC)
The purpose of Operations Security (OPSEC) is: (19.6.2.)
to reduce the vulnerability of Air Force missions by preventing adversary collection and exploitation of critical information
The purpose of OPSEC is to reduce the vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information. Operational effectiveness is enhanced when: (19.6.3.)
OPSEC is applied from the earliest stages of planning
Air Force forces can be under observation at their peacetime bases and locations, in training or exercises, while moving, or when deployed to the field conducting actual operations. Therefore, OPSEC principles must be integrated into _______. (19.6.4.)
-operational planning-support planning-exercise and acquisition planning
OPSEC should be incorporated into day-to-day activities to ensure a seamless transition to contingency operations. The OPSEC process consists of five distinct steps: (19.6.4.)
identify critical information, analyze threats, analyze vulnerabilities, assess risk, and apply appropriate OPSEC measures
Sources of OPSEC indicators are: (19.6.5.)
friendly, detectable actions, and open-source information that can be pieced together by an adversary to derive critical information
OPSEC indicators have five basic characteristics that make them potentially valuable to an adversary: (19.6.5.)
Signatures, Associations, Profiles, Contrasts, and Exposure
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Signatures refers to: (19.6.5.1.)
the characteristic of an indicator that makes it identifiable or causes it to stand out
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Associations refers to: (19.6.5.2.)
the relationship of an indicator to other information or activities
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Profiles are defined as: (19.6.5.3.)
how each activity has its own set of unique signatures and associations
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Contrasts are: (19.6.5.4.)
any difference observed between an activity’s standard profile and its recent or current actions
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Exposure is: (19.6.5.5.)
when and for how long an indicator is observed
The Air Force policy to identify, classify, downgrade, declassify, mark, protect, and destroy its classified information consistent with national policy is known as: (19.7.)
Information Security (INFOSEC)
The initial decision to classify an item of information because unauthorized disclosure could damage national security is: (19.7.1.1.)
original classification
The initial decision to classify an item of information because unauthorized disclosure could damage national security is known as original classification. The decision to originally classify information may only be made by: (19.7.1.1.)
the Secretary of Defense, the secretaries of the military departments, and other officials specifically delegated this authority in writing
Only the Secretary of Defense, the secretaries of the military departments, and other officials specifically delegated this authority in writing may originally classify information. Within the Air Force, Original Classification Authorities (OCAs) are appointed at the Top Secret-and-below levels by: (19.7.1.1.)
the Secretary of the Air Force
Only the Secretary of Defense, the secretaries of the military departments, and other officials specifically delegated this authority in writing may originally classify information. Within the Air Force, Original Classification Authorities (OCAs) are appointed at the Secret-and-below levels by: (19.7.1.1.)
the Administrative Assistant to the Secretary of the Air Force
A Security Classification Guide (SCG) specifies items or categories of information for each system, program, plan, or project that must be classified. The SCG identifies: (19.7.1.1.1.)
-the original classification authority and a point of contact-the reason for classification and declassification instructions-for each item or category of information, the applicable classification level
Derivative classification is the: (19.7.1.2.)
classification of information when it is extracted, paraphrased, restated, or generated in a new form
Every classified document must be marked: (19.7.1.4.)
to show the highest classification of information it contains
Every classified document must be marked to show the highest classification of information it contains. The overall classification will be identified on: (19.7.1.4.)
the front cover, the title page, the first page, and the outside of the back cover
The overall classification of a classified document will be identified on the front cover, the title page, the first page, and the outside of the back cover. In addition, every classified document must show the agency, office of origin, and date of origin on: (19.7.1.4.1.)
the first page, title page, or front cover
Every originally classified document must have a “Classified by” line placed on the first page, title page, or front cover that identifies the original classification authority responsible for classifying the information it contains. Derivatively classified documents are marked: (19.7.1.4.2.)
-“Derived from” and the document and date the information was derived fromOr-the words “Multiple Sources”
Information must be declassified: (19.7.1.5.)
as soon as it no longer meets the standards for classification
Information must be declassified as soon as it no longer meets the standards for classification. There are 4 separate systems that can bring about the declassification of information: (19.7.1.5.)
-the decision at the time of classification as to when it can be declassified-the automatic declassification on the 25th anniversary of its classification-the review for declassification upon request and during a systematic review
If reason exists to indicate a document has been classified improperly or unnecessarily, personnel should submit challenges of classification to: (19.7.1.6.)
the security manager or the classifier of the information
Classified information must be protected at all times by either of two methods: (19.7.2.1.)
-storing it in an approved security container or facility-having it under the personal observation and control of an authorized individual
Heads of activities that process or store classified information must establish a system of security checks at the close of each working day to ensure the area is secure. What form is used to record these checks? (19.7.2.3.)
SF 701, Activity Security Checklist
A person may not have access to classified information unless they have the proper security clearance, the need to know, and: (19.7.2.4.)
have signed a nondisclosure agreement
A person may not have access to classified information unless they have the proper security clearance, the need to know, and have signed a nondisclosure agreement. The final responsibility for determining if a person has the proper security clearance and requires access to classified information rests with: (19.7.2.4.)
the individual authorized possession, knowledge, or control of the information
Classified information at the Top Secret level is controlled and accounted for through: (19.7.2.4.1.)
top secret control account systems
Classified information at the Secret level is controlled and accounted for through: (19.7.2.4.2.)
internal controls as determined by unit commanders or staff agency chiefs
Confidential information is controlled and accounted for through: (19.7.2.4.3.)
routine administrative procedures
Material classified at this level does not require a receipt when transferring the material. (19.7.2.4.3.)
confidential
Any person who becomes aware of the possible compromise of classified information must: (19.7.2.5.)
immediately report it to the head of his or her local activity or to the activity security manager
DoD military and civilian personnel are subject to sanctions if they knowingly, willfully, or negligently disclose classified information to unauthorized persons. Sanctions include, but are not limited to: (19.7.3.)
-warning, reprimand, suspension without pay and forfeiture of pay-removal, discharge, and loss of access to classified information-action under the UCMJ and under applicable criminal law
The Personnel Security Program involves: (19.8.1.)
determining the trustworthiness of individuals before they have access to classified information
The Personnel Security program requires commanders and supervisors to continually observe their subordinates’ behavior. If warranted, the commander reports unfavorable information to the _______ . (19.8.2.)
Air Force Central Adjudication Facility (AFCAF)
Personnel security clearances are recorded in the _______. (19.8.3.)
Joint Personnel Adjudication System (JPAS)
The Industrial Security Program involves: (19.9.1.)
identifying information in classified contracts that must be protected while entrusted to industry
Air Force policy is to identify, in its classified contracts, specific government information and sensitive resources that must be protected against compromise or loss while entrusted to industry. Which AFI provides guidance and assigns functional responsibilities? (19.9.1.)
AFI 31-601, Industrial Security Program Management
The security policies, requirements, and procedures identified in AFI 31-601, Industrial Security Program Management, are applicable to: (19.9.2.)
Air Force personnel and on-base DoD contractors